Bienvenue à la Bibliothèque Alo de l'Université Shalom de Bunia
A partir de cette page vous pouvez :
Retourner au premier écran avec les dernières notices... | Votre compte |
Titre : | Hack Attacks Revealed: A Complete Reference With Custom Security Hacking Toolkit |
Auteurs : | John Chirillo |
Type de document : | document électronique |
Editeur : | [S.l.] : Wiley, 2001 |
ISBN/ISSN/EAN : | 978-0-471-18992-3 |
Index. décimale : | 005.8 (S├®curit├® des donn├®es. Protection contre le piratage informatique) |
Résumé : |
"The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs. ### Review ""Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"" (Kelly M. Larsen , C2Protect, DoD Security Instructor) ""Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."" (L. Peterson, AFCERT) ""[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks."" (HiTech Review) ""Whoever ""you"" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods."" (Bill Camarda, Slashdot) ### From the Author The primary objective of this book is to lay a solid foundation from which to explore the world of security. This book tells the truth to bring awareness about the Underground, the hackerÔÇÖs community, and to provide the tools for doing so. The difference between this book and other manuscripts is that it is written from a hackerÔÇÖs perspective. The internetworking primers in Parts 1 and 2, coupled with Chapter 6, ÔÇ£The HackerÔÇÖs Technology Handbook, will educate you about the technologies required to delve into security and hacking. These chapters can be skimmed if your background is technically sound, and later used as references. Part 3 reviews the tools and vulnerability exploits that rule ÔÇ£hackerdom.ÔÇØ Part 4 continues by describing covert techniques used by hackers, crackers, phreaks, and cyberpunks to penetrate security weaknesses. Part 5 reveals hacking secrets of gateways, routers, Internet server daemons, operating systems, proxies, and firewalls. Part 6 concludes with the software and construction necessary for compiling a TigerBox, used by security professionals and hackers for sniffing, spoofing, cracking, scanning, spying, and penetrating vulnerabilities. Throughout this book you will also encounter In! tuitive Intermissions, real-life interludes about hacking and the Underground. Through them youÔÇÖll explore a hackerÔÇÖs chronicles, including a complete technology guide. Who Should Read This Book Evaluators of this book have suggested that this book it may become a required reference for managers, network administrators, network engineers, internetworking engineers, even interested laypeopleÔÇöthe hacking enthusiast and admirer of such films as Sneakers, The Matrix, and Hackers." |